{
  "threat_severity" : "Important",
  "public_date" : "2026-01-08T00:00:00Z",
  "bugzilla" : {
    "description" : "libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication",
    "id" : "2427906",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2427906"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.6",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-121",
  "details" : [ "A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.", "A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk." ],
  "statement" : "The Red Hat Product Security team has assessed this vulnerability as Important severity due to its remote exploitability and lack of authentication requirements. Successful exploitation allows an attacker to crash any client or service using libsoup’s NTLM authentication mechanism. The root cause is improper handling of signed integer arithmetic, which leads to stack buffer overflow and denial-of-service.",
  "acknowledgement" : "Red Hat would like to thank treeplus for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2182",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.1",
    "package" : "libsoup3-0:3.6.5-3.el10_1.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10.0 Extended Update Support",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2006",
    "cpe" : "cpe:/o:redhat:enterprise_linux_eus:10.0",
    "package" : "libsoup3-0:3.6.5-3.el10_0.14"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
    "release_date" : "2026-02-12T00:00:00Z",
    "advisory" : "RHSA-2026:2628",
    "cpe" : "cpe:/o:redhat:rhel_els:7",
    "package" : "libsoup-0:2.62.2-11.el7_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2214",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "spice-client-win-0:8.10-7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2215",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "libsoup-0:2.62.3-13.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2215",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "libsoup-0:2.62.3-13.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support",
    "release_date" : "2026-02-10T00:00:00Z",
    "advisory" : "RHSA-2026:2396",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.2",
    "package" : "libsoup-0:2.62.3-1.el8_2.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2513",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.2",
    "package" : "spice-client-win-0:8.10-7.el8_2.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2026-02-10T00:00:00Z",
    "advisory" : "RHSA-2026:2402",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "libsoup-0:2.62.3-2.el8_4.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2514",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "spice-client-win-0:8.10-7.el8_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On",
    "release_date" : "2026-02-10T00:00:00Z",
    "advisory" : "RHSA-2026:2402",
    "cpe" : "cpe:/a:redhat:rhel_eus_long_life:8.4",
    "package" : "libsoup-0:2.62.3-2.el8_4.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2514",
    "cpe" : "cpe:/a:redhat:rhel_eus_long_life:8.4",
    "package" : "spice-client-win-0:8.10-7.el8_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2512",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "libsoup-0:2.62.3-2.el8_6.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2529",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "spice-client-win-0:8.10-7.el8_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2512",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "libsoup-0:2.62.3-2.el8_6.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2529",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "spice-client-win-0:8.10-7.el8_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2512",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "libsoup-0:2.62.3-2.el8_6.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2529",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "spice-client-win-0:8.10-7.el8_6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
    "release_date" : "2026-02-04T00:00:00Z",
    "advisory" : "RHSA-2026:1948",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.8",
    "package" : "libsoup-0:2.62.3-3.el8_8.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2528",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.8",
    "package" : "spice-client-win-0:8.10-7.el8_8.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
    "release_date" : "2026-02-04T00:00:00Z",
    "advisory" : "RHSA-2026:1948",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.8",
    "package" : "libsoup-0:2.62.3-3.el8_8.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
    "release_date" : "2026-02-11T00:00:00Z",
    "advisory" : "RHSA-2026:2528",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.8",
    "package" : "spice-client-win-0:8.10-7.el8_8.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2026-02-09T00:00:00Z",
    "advisory" : "RHSA-2026:2216",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "libsoup-0:2.72.0-12.el9_7.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2008",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.0",
    "package" : "libsoup-0:2.72.0-8.el9_0.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2005",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.2",
    "package" : "libsoup-0:2.72.0-8.el9_2.10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2007",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "libsoup-0:2.72.0-8.el9_4.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.6 Extended Update Support",
    "release_date" : "2026-02-05T00:00:00Z",
    "advisory" : "RHSA-2026:2049",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.6",
    "package" : "libsoup-0:2.72.0-10.el9_6.6"
  }, {
    "product_name" : "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
    "release_date" : "2026-02-17T00:00:00Z",
    "advisory" : "RHSA-2026:2844",
    "cpe" : "cpe:/a:redhat:openshift_devspaces:3.26::el9",
    "package" : "devspaces/openvsx-rhel9:sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96"
  }, {
    "product_name" : "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
    "release_date" : "2026-02-17T00:00:00Z",
    "advisory" : "RHSA-2026:2844",
    "cpe" : "cpe:/a:redhat:openshift_devspaces:3.26::el9",
    "package" : "devspaces/pluginregistry-rhel9:sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e"
  }, {
    "product_name" : "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
    "release_date" : "2026-02-17T00:00:00Z",
    "advisory" : "RHSA-2026:2844",
    "cpe" : "cpe:/a:redhat:openshift_devspaces:3.26::el9",
    "package" : "devspaces/udi-rhel9:sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "libsoup",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-0719\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-0719\nhttps://gitlab.gnome.org/GNOME/libsoup/-/issues/477" ],
  "name" : "CVE-2026-0719",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}